Second International Conference on Embedded Software and Systems (ICESS'05)

16-18 Dec. 2005

Filter Results

Displaying Results 1 - 25 of 97
  • Second International Conference on Embedded Software and Systems - Cover

    Publication Year: 2005, Page(s): c1
    Request permission for reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • ICESS 2005. Second International Conference on Embedded Software and Systems

    Publication Year: 2005
    Request permission for reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Second International Conference on Embedded Software and Systems - Copyright

    Publication Year: 2005, Page(s): iv
    Request permission for reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Second International Conference on Embedded Software and Systems - Table of contents

    Publication Year: 2005, Page(s):v - xii
    Request permission for reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • Keynote speakers

    Publication Year: 2005, Page(s):xiii - xvii
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (140 KB) | HTML iconHTML

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preface

    Publication Year: 2005, Page(s): xviii
    Request permission for reuse | PDF file iconPDF (70 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizers

    Publication Year: 2005, Page(s): xix
    Request permission for reuse | PDF file iconPDF (67 KB)
    Freely Available from IEEE
  • Program/Technical Committee

    Publication Year: 2005, Page(s):xx - xxii
    Request permission for reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • Workshops

    Publication Year: 2005, Page(s):xxiii - xxviii
    Request permission for reuse | PDF file iconPDF (84 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing conflicts in SMT VLIW processor for higher throughput

    Publication Year: 2005
    Cited by:  Patents (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    Cache misses and insufficient instruction-level parallelism (ILP) in a single program make functional units of VLIW (very long instruction word) processor underused. Simultaneous multithreading (SMT) technology is one of the best choices to improve the utilization of functional units in processors, since it can convert thread-level parallelism (TLP) to ILP. Previous work investigate how to incorpo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An embedded system architecture for acoustic signal capturing and orientation

    Publication Year: 2005
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (4269 KB) | HTML iconHTML

    For the light weight acoustic reconnaissance applications, an embedded architecture design including hardware and software is proposed in this paper. The novel architecture model is based on dual-DSP in which master DSP cooperates with slave DSP to speed up the data processing while keeping low power consumption. This paper especially focuses on the hard and software implementations of this model.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of data-path for a VLIW media coprocessor

    Publication Year: 2005
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (169 KB) | HTML iconHTML

    A design study of data-path for a VLIW media coprocessor is presented. The VLIW coprocessor executes the kernels in media applications, and has great impact on the performance of the media processor. To explore the architecture tradeoff at early stage, we proposed three architecture models, and hand scheduled three typical kernels onto the models, with the instruction set simulator, we evaluated a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The design and analysis of a high performance embedded external memory interface

    Publication Year: 2005
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (203 KB) | HTML iconHTML

    This paper introduces several important methods to design the embedded external memory interface (EMIF) for a high performance DSP (digital signal processor). Starting with the design specification of the EMIF, this paper introduces four important new design methods, i.e. width-scalable accessing, data buffers based on asynchronous FIFOs, token cycle method for priority arbitration, and preferenti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid RAID-tape-library storage system for backup

    Publication Year: 2005
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    Traditional tape back-up systems have begun to wear out their welcomes in some businesses, which are turning to the virtual tape technologies. The virtual tape technologies combine the traditional backup methodology with the disk drive technology to create a disk-based library that acts as a tape library. In concert with the traditional backup software from vendors, the virtual tape libraries writ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A unified architecture for crypto-processing in embedded systems

    Publication Year: 2005
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    Security is an emerging concern in the design of embedded systems. Various side channel attacks must be tackled by the implementation of secure embedded system. This paper proposes a unified architecture of crypto-processor that can resist probing attacks of internal bus and memory. Private keys are maintained within the execution unit to reduce the possibility of leakage during cryptographic oper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supports for components loading and binding at boot-time for component-based embedded operating systems

    Publication Year: 2005
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    This paper presents the process of boot-time components loading and binding for TICK, a component-based embedded operating system targeted at resource-constrained devices. Based on the memory configuration information exported from the hardware abstraction layer, service components are loaded one-by-one through a configurable tunnel between the target and a hosting machine. Since the relocation in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A remote wire/wireless video monitor system using HW/SW co-scheduling RTOS

    Publication Year: 2005
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (557 KB) | HTML iconHTML

    The remote wire/wireless video monitor system (RWVMS) is a video monitor and control system developed successfully by NEUINFO. RWVMS consists of several sub-systems each of them forming a complex independent component. RWVMS covers the task controlling, configuring and monitoring of the system. Since the experiment will be running in a radiation environment, fault tolerance, error correction and s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An embedded firewall based on network processor

    Publication Year: 2005
    Cited by:  Patents (8)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (250 KB) | HTML iconHTML

    A design of firewall system using Intel IXP425 network processor (NP) based embedded platform is proposed in this paper. Intel IXP425 network processor is a highly integrated processor. It has three network processor engines (NPEs), which offload most of the computational intensive network data operations, and one of its NPE is designed with hardware support for some of the widely used encryption ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecturally reconfigurable development of mobile games

    Publication Year: 2005
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (257 KB) | HTML iconHTML

    Mobile game development must face the problem of multiple hardware and software platforms, which will bring large number of variants. To cut the development and maintenance efforts, in this paper, we present an architecturally reconfigurable software product line approach to develop mobile games. Mobile game domain variants could be handled uniformly and traced across all kinds of software assets.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of an agile kernel component runtime

    Publication Year: 2005
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    In this paper, we describe ARMOR, an Agile keRnel coMpOnent Runtime which seeks to greatly enhance operating system reliability and performance at the same time. ARMOR is made up of AKE, Agile Kernel Engine which is implemented in kernel, and system servers which are user processes. In ARMOR, the kernel functions are encapsulated through component and can be loaded both into kernel address space f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software architecture for a multi-protocol RFID reader on mobile devices

    Publication Year: 2005
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (561 KB) | HTML iconHTML

    In RFID (radio frequency identification) systems, a tag reader or a tag interrogator communicates with tags, reads their identification codes, and accesses their related database through a network infrastructure. There are many research activities in RFID hardware systems, but there is few in software infrastructure, especially on mobile devices. This paper presents software architecture and imple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new embedded car theft detection system

    Publication Year: 2005
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    A new embedded car theft detecting system has been introduced in this paper. This system is based upon machine vision technology, acids a new level of car theft detecting, and it is no intrusive on the drivers. This system uses face detecting and recognition technology. When the unauthorized driver is driving the car, it will detect him and alarm by sending his image to police or car owner. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficiency metrics model for component-based embedded application software

    Publication Year: 2005
    Cited by:  Papers (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    This paper develops efficiency metrics model to support application-level evaluation of embedded system resource utilization. In particular, we address the efficiency metrics of embedded application software running on a component-based embedded system. Efficiency analysis and estimate are, therefore, essential and critical during the design and integration of embedded application software, to est... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A micro-component architecture approach for next generation embedded browsers

    Publication Year: 2005
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (414 KB) | HTML iconHTML

    The mobile Internet adds the new multi-media features and takes a convergence to the wired Internet. The emerging diversity of the content languages adds a new challenge as well as the sustained challenge from the diversity of the execution environments. The author describes the mobile Internet evolution from the browser viewpoint in the three-stage model. After describing the focus shift during t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of wireless gateway communication protocol for distributed monitoring systems

    Publication Year: 2005
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (258 KB) | HTML iconHTML

    This paper is concerned with the problems of the wireless gateway communication protocol for distributed monitoring systems. For large-scale monitoring systems, the wireless gateway is needed to improve the communicating ability. We present the framework of the wireless gateway protocol stacks, which can be used in embedded systems. By introducing the mechanism of segment caching and local retrans... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.